Saturday, September 7, 2024
Homecyber securityNew Styx Stealer Attacking Users to Steal Login Passwords

New Styx Stealer Attacking Users to Steal Login Passwords

Published on

A new cybersecurity threat, known as Styx Stealer, has emerged. It targets users by stealing sensitive data such as saved passwords, cookies, and autofill information from popular web browsers.

This malware affects Chromium and Gecko-based browsers and extends its reach to browser extensions, cryptocurrency wallets, and even messaging platforms like Telegram and Discord.

According to a recent tweet from ThreatMon, the revelation of Styx Stealer has raised alarms among cybersecurity experts and users alike, as it poses a significant risk to online security.

- Advertisement - EHA

Free Webinar on Detecting & Blocking Supply Chain Attack -> Book your Spot

Exploiting Windows Defender Vulnerability

Styx Stealer exploits a vulnerability in Microsoft Windows Defender SmartScreen, identified as CVE-2023-36025, also known as Phemedrone Stealer.

This vulnerability became widespread in early 2024, allowing malicious actors to bypass security measures and infiltrate users’ systems.

Exploiting this vulnerability highlights the ongoing challenges in maintaining robust cybersecurity defenses, especially as threat actors continue to find and exploit weaknesses in widely used software.

Interestingly, a demonstration of the Styx Stealer’s capabilities has been posted on its developer’s YouTube channel.

Although the channel is not active, the demonstration has caught the attention of cybersecurity professionals working to mitigate the threat.

Additionally, a threat actor has been found offering the Styx Stealer for sale on a popular Russian forum, indicating a potential for widespread distribution.

This development underscores the need for vigilance among users and organizations to protect their digital assets.

As the situation unfolds, experts recommend that users update their security software, remain cautious of suspicious links and downloads, and regularly change their passwords to safeguard against potential breaches.

The emergence of Styx Stealer serves as a stark reminder of the evolving landscape of cyber threats and the importance of proactive cybersecurity measures.

Are you from SOC and DFIR Teams? Analyse Malware Incidents & get live Access with ANY.RUN -> Get 14 Days Free Access

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...